First published: Tue Aug 20 2024(Updated: )
Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kubernetes Dashboard | <3385 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-42363 is classified as high due to the potential for remote code execution through unsafely deserialized user input.
To fix CVE-2024-42363, update your Kubernetes installation to version 3385 or later.
CVE-2024-42363 affects Kubernetes versions prior to 3385.
The impact of CVE-2024-42363 includes potential unauthorized access and manipulation of application data.
CVE-2024-42363 occurs when a user-controlled role parameter is unsafely deserialized in the Kubernetes::RoleVerificationsController.